דרושים » אבטחת מידע וסייבר » JSOC - Cybersecurity Specialist, Digital Threat Hunting

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
23/04/2026
Location: Merkaz
Job Type: Full Time
Were looking for our next Specialist, Digital Threat Hunting.
Could It Be You?
Your contribution delivering sustainable and measurable results in the following areas will be very important:
Identifying and taking down customer-facing and external digital threats - monitoring phishing sites, brand impersonation, typosquatting domains, and fraud campaigns targeting the organization and its customers. You will be primarily involved in investigating digital fraud patterns, coordinating takedowns with registrars and hosting providers, monitoring social media for brand threats, and maintaining relationships with external abuse teams and law enforcement. You will be working alongside internal customers and our vendor support teams to ensure we are utilizing our security tools in accordance with corporate policies and growing business needs. You will work closely with Cybersecurity and IT teams to align priorities and execute plans for new initiatives, as well as contribute to process improvements and build documentation for new tools.
Requirements:
3+ years of relevant experience in threat intelligence, OSINT, digital fraud investigation, or security operations.
Experience with OSINT techniques, tools, and methodologies for investigating external threats and digital fraud.
Practical experience with phishing kit analysis, credential harvesting page identification, and fraud pattern recognition.
Experience with brand protection and monitoring platforms for detecting impersonation, counterfeiting, and fraud campaigns.
Experience coordinating takedown requests with domain registrars, hosting providers, and social media platforms.
Experience investigating and tracking digital fraud TTPs, credential harvesting, and customer-targeted scams.
Strong understanding of domain registration, DNS, WHOIS, and internet infrastructure fundamentals.
Knowledge of social media platforms, fraud detection indicators, and brand impersonation identification.
Knowledge of dark web monitoring tools, underground forums, and threat actor communication channels.
Knowledge of fraud frameworks, anti-fraud platforms, and industry standards for brand protection and customer safety.
Experience with dark web monitoring and threat intelligence platforms.
Scripting skills (Python) for OSINT automation.
Active participation in fraud prevention and brand protection communities.
Brownie points if you have...
GOSI, SANS FOR589, GCTI, HTB CDSA or similar relevant certifications.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8621218
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
23/04/2026
Location:
Job Type: Full Time
oin us to help leverage the data we have, as we solve exciting challenges such as building out new models, algorithms and solving complex business problems to grow and deliver customer-centric solutions in a multi-product/multi-channel financial services environment.
Whats it like working as a Junior SOC Specialist, Incident Response, ?
Your contribution delivering sustainable and measurable results in the following areas will be very important:
Identifying and responding to cyber threats - safeguarding our company's infrastructure and data. You will be primarily involved in supporting the alert development cycle, triaging and investigating alerts, assisting with the incident response lifecycle (investigation, containment, eradication, and recovery) and collecting and tracking metrics for reporting. You will be working alongside internal customers and our vendor support teams to ensure we are utilizing our security tools in accordance with corporate policies and growing business needs. You will work closely with Cybersecurity and IT teams to align priorities and execute plans for new initiatives, as well as contribute to process improvements and build documentation for new tools.
Need more details? Keep reading...
You will:
Monitor, analyze and report possible cybersecurity attacks.
Assist senior analysts with investigations and escalate findings as needed.
Investigate and perform analysis of threat indicators.
Gather Indicators of compromise and any relevant data to use with threat hunting activities.
Leverage security tools (Elastic, CrowdStrike and more) for analysis to identify malicious activities.
Analyze identified malicious activity to determine Tactics, Techniques and Procedures.
Assist with research, analysis and correlate gathered data from various resources to determine the impact of the incident.
Execute containment and eradication actions under guidance, following established playbooks.
Participate in on-call and hands-on scheduled shift rotations, including outside of business hours.
Support Security Incident Response and investigation alongside internal teams and 3rd party providers.
Document incident timelines, evidence, and actions taken for post-incident review.
Participate in post-incident reviews and contribute to lessons-learned reports.
Follow and contribute to incident response playbooks and runbooks.
Participate in tabletop exercises and IR simulations.
Assist with proactive security investigation and searches on corporate environments to detect malicious activities.
Maintain up-to-date understanding of security threats, countermeasures, security tools, cloud security and SaaS technologies.
Maintain technical proficiency through training, keeping up with industry est practices, and security frameworks.
Escalate investigation findings and security concerns to senior team members.
Contribute to tracking SOC operational metrics (MTTD, MTTR, alert fidelity).
דרישות:
1+ years of relevant experience in performing Cybersecurity Incident Response and Threat Hunting activities.
Familiarity with detection rules and alert logic.
Exposure to security tool integrations and basic understanding of SOAR concepts.
Familiarity with investigations and incident response using EDR tools such as CrowdStrike Falcon and SIEM tools such as Elastic Security (KQL, ESQL, Timeline analysis).
Basic understanding of forensic triage (disk, memory, network) and multiple operating systems (Mac, Linux, Windows).
Familiarity with SOC processes, playbooks, and incident reports.
Ability to communicate clearly and work effectively under pressure.
Basic understanding of programming and scripting concpts.
Basic understanding of NIST Cybersecurity Framework, MITRE ATT&CK.
Basic understanding of security products and device monitoring tools including Firewalls, IDS/IPS, Phishing and e-mail security, content filtering, DDoS, WAF, and more.
Brownie points if
GSEC, Security+, CySA+, CSA, CEH or similar relevan המשרה מיועדת לנשים ולגברים כאחד.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8621233
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Ramat Gan
Job Type: Full Time and Temporary
We are looking for a Red Team specialist for our Infrastructure Red Team department for a maternity leave replacement. This role includes researching, assessing and challenging digital identity verification and access mechanisms across a variety of platforms and solutions.

The position includes creative red team projects and infrastructure management alongside end-to-end delivery to key clients. You will be responsible for the generation of insights, means, methods and signals provided from diverse intelligence streams alongside red team exercises meant to assist with identifying key vulnerabilities, high risk abuses, and mitigation solutions and planning.

Key responsibilities:
Red Team operations - strategic planning and execution of red team exercises
Identification, analysis and intelligence gathering on bad actors, sources and platforms, while identifying abuse methods
Research and development of new operational bypass methods
Provide insights on intricate means and methods being used by threat actors to abuse the worlds most popular tech platforms while putting users at risk
Monitoring Web and Mobile environments - social media platforms, forums, blogs, mobile applications and darknet to uncover malicious activity.
Content creation and management.
Requirements:
Requirements:
Hands on experience in operational processes and / or investigations within the different realms of the cyber sphere (mobile environments and web).
Knowledge in OSINT investigation techniques and red teaming.
Online and infrastructure security orientation.
Fluent English - Strong written and verbal communication skills
Curiosity and out of the box thinking.
Proven ability to identify trends and methodologies that support the different infrastructure environments creation and management.
A proactive and independent learner of new practice areas and technological tools.
Ability to work under pressure.

Nice to have:
Additional languages.
Python proficiency.
Experience in threat modeling and adversary emulation specifically focused on digital identity attacks.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8623930
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are expanding our Research Team and are looking for a Junior Malware Researcher with a strong technical mindset, excellent communication skills, and a passion for problem-solving.
As a Malware Researcher, you will be responsible for hunting emerging malware and malvertising campaigns and developing effective detection methods to protect global customers. You will work closely with the R&D and Product teams and be part of a friendly, professional team based in Tel Aviv, supporting customers worldwide.
Responsibilities:
Detect, monitor, and hunt new malvertising and malware threats
Research new attack vectors, delivery methods, and evasion techniques
Develop and improve detection logic and signatures
Investigate malicious campaigns using internal tools, databases, logs, and external intelligence sources to uncover hidden patterns
Analyze web traffic, scripts, redirects, and network behavior to identify malicious activity
Collaborate with R&D and Product teams to translate research into production-grade protections
Contribute to internal documentation, research reports, and best practices to improve knowledge sharing and support processes
Requirements:
0-1 years of relevant experience, or equivalent technical background (military, academic, or self-driven research)
Strong understanding of web technologies , including HTML, JavaScript, browser behavior, and client-side execution
Solid foundation in security concepts, such as web threats, malware behavior, and attack chains
Familiarity with networking concepts (HTTP/HTTPS, DNS, redirects, basic TCP/IP)
Hands-on experience with at least one programming or scripting language: JavaScript, TypeScript, or Python
Basic experience working with SQL and data analysis
Ability to investigate issues end-to-end, from technical root cause to customer impact
Strong analytical thinking and problem-solving skills
Fluent English (written and spoken)
Independent, accountable, proactive, and comfortable taking ownership of tasks
Advantages (Nice to Have):
Experience or familiarity with the ad tech ecosystem (DSPs, SSPs, publishers, ad networks)
Exposure to malware analysis, threat intelligence, or SOC workflows
Familiarity with AI tools or AI-assisted research workflows
Experience with monitoring, visualization, or log analysis tools (e.g., Kibana, Grafana)
Basic experience with automation, scripting, or data parsing
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8627389
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
23/04/2026
חברה חסויה
Location:
Job Type: Full Time
Were looking for our next Cybersecurity Specialist. Could It Be You?
Your contribution delivering sustainable and measurable results in the following areas will be very important:
The Cybersecurity Specialist role is a pivotal position within the CISO function, reporting to the Senior Manager, Cybersecurity Strategy & Risk. This role is dedicated to supporting the design, implementation and maturation of modern security frameworks, with a primary focus on driving the organizations Zero Trust journey.
Need more details? Keep reading
You will be:
Executing Strategic Security Controls: Supporting the design and implementation of ZTNA, Data Loss Prevention (DLP) and Application Control rules across endpoint, network, datacenter, cloud and SaaS environments to ensure comprehensive protection of enterprise systems and data.
Strengthening Network Defenses: Supporting the implementation and optimization of CASB profiles to enhance visibility into the security posture of SaaS environments.
Identifying and Mitigating Emerging Risks: Supporting the implementation of advanced capabilities to proactively prevent endpoint software supply-chain risks and the unauthorized use of applications, extensions, plugins, and AI Agents, ensuring these do not compromise the enterprise security posture.
Driving Continuous Improvement: Identifying existing and emerging risks; Researching and implementing innovative security tools and methodologies to enhance overall security maturity and resilience against a dynamic threat landscape.
Collaborative Implementation: Working closely with cross-functional IT and business teams to embed security-by-design principles and operationalize security capabilities across the organization.
Requirements:
Experience: a minimum of 2 years of experience in Cybersecurity, Network Engineering, or a related technical role within a complex enterprise environment. Experience in a regulated financial services environment is a plus.
Network Security & Infrastructure: Strong understanding of networking fundamentals, Routing protocols, next-gen firewalls, DNS and Windows/Linux OS, and the ability to troubleshoot complex connectivity issues. Experience or good knowledge of firewall administration, and rules management is a plus.
Identity & Access: Understanding of Identity & Access Management (IAM) lifecycles and the principle of least privilege. Foundational knowledge of Authentication protocols (SAML, OIDC, Kerberos, Multi-Factor Authentication) and their role in a modern perimeter.
Web & Cloud Security: Understanding of secure web gateways and cloud-native security architectures. Experience operating Zscaler is considered a strong asset.
Data Protection: Strong conceptual understanding of Data Loss Prevention (DLP) strategies across endpoints, networks, and cloud applications.
Modern Security Frameworks: Knowledge of Zero Trust Network Access (ZTNA) principles and how they differ from traditional VPN-based architect
SaaS Security: Familiarity with Cloud Access Security Broker (CASB) concepts, including API-based protection and forward-proxy modes.
Automation & Scripting: Proficiency in Python for automating security tasks, parsing logs, or integrating security tools via APIs and experience with "Vibe Coding" or using AI-assisted development tools (e.g., Cursor, GitHub Copilot, Claude Code, and Gemini LLMs) to rapidly prototype security solutions, dashboards, and scripts.
Technical Visualization: Support the creation of professional architectural diagrams and data-flow visualizations to document ZTNA environments and security control implementations.
Strong verbal and written communication skills in English
Education: University degree or College diploma in Computer Science, Cybersecurity, Information Technology, or a related field or relevant experience.
Certifications (Preferred): Progress towards or achievement of relevant certifications such as CompTIA Security+, CCNA, or vendor-specific clo
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8621247
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
לפני 13 שעות
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for a hands-on security researcher who combines an attacker mindset, fraud-domain curiosity, strong technical depth, and data analysis skills. You will investigate real-world fraud patterns, reproduce attacker techniques, analyze telemetry, enrich our data collection capabilities, discover new security signals, and work closely with product, data, and engineering teams to turn research insights into production-grade detection and prevention mechanisms.
This role is especially relevant for researchers with experience in browser technologies, mobile-native applications, or both. You may work on desktop and mobile browsers, browser APIs, browser automation, client-side signals, native mobile applications, Android/iOS behavior, mobile security, emulators, device signals, and mobile automation.
You will help expand our visibility into new signals and patterns that improve fraud detection, model performance, and customer protection.
If you are a talented researcher who enjoys solving complex problems, working with messy real-world data, and building practical defenses against modern fraud and abuse, we want you to join our team.
Requirements:
At least 3 years of experience in security research, fraud research, detection engineering, threat research, mobile security research, browser security research, or a similar hands-on technical role.
Bachelors degree in Computer Science, Cybersecurity, Data Science, or a related field or equivalent hands-on experience.
Strong hands-on experience with at least one of the following areas:
Desktop or mobile browsers, browser APIs, browser automation, browser fingerprinting, web signals, or client-side web security.
Native mobile applications for Android or iOS, mobile OS behavior, device signals, emulators, mobile automation, app instrumentation, or mobile security.
Strong understanding of web technologies, mobile technologies, APIs, application behavior, and modern attack techniques.
Strong Python skills and experience building research tools, automation, data analysis workflows, detection prototypes, or feature engineering pipelines.
Experience analyzing messy real-world data, investigating anomalies, validating hypotheses, and drawing practical conclusions from incomplete information.
Familiarity with machine learning training and validation concepts, such as train/test split, validation sets, overfitting, leakage, feature quality, precision/recall, false positives, false negatives, and model evaluation.
Ability to produce data features in a structured, reliable, and model-friendly way.
Ability to think like an attacker while designing reliable, scalable, and explainable defenses.
Strong problem-solving skills, independence, persistence, and a getting things done attitude.
Excellent communication and interpersonal skills.
Ability to work closely with engineering, product, and data science teams and translate research insights into practical product capabilities.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8659078
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Ramat Gan
Job Type: Full Time and Temporary
We are seeking to hire an Intelligence Infrastructure Expert for a full time position. The role includes creation, management, and integration of the companys unique infrastructure and tools across the different Web environments.

The position includes infrastructure establishment and processes management alongside end to end delivery to the different teams within the organization. You will be responsible for the generation of insights, means, and methods provided from diverse intelligence streams enabling the organizations teams to make the internet a safer place.

Responsibilities:
Monitoring Web and Mobile environments - social media platforms, forums, blogs, mobile applications and darknet to uncover malicious activity.
Identification, analysis and intelligence gathering on bad actors, sources and platforms, while identifying distribution methods.
Provide insights on intricate means and methods being used by threat actors to abuse the tech worlds most popular platforms while putting users at risk.
Identify and address opportunities alongside potential problems in operational processes.
Research, development and strategizing of new operational methods and logics.
Requirements:
We are looking for an expert with a Can Do! approach with the following desirable skills, qualities and experience:
Mandatory:
Minimum 1 year experience in establishing and management of intelligence infrastructure.
Operational online security orientation: Demonstrate awareness of security risks in diverse operational environments and understand appropriate mitigation measures.
Experience in operational processes and / or investigations within the different realms of the cyber sphere (mobile environments and web)
OSINT and online research experience.
Proven ability to identify trends and methodologies that support the different infrastructure environments creation and management.
A proactive and independent learner of new practice areas and technological tools.
Strong written and verbal communication skills.
Fluent English.

Nice to have:
Additional languages.
Curiosity and out of the box thinking.
Ability to work under pressure.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8623890
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
5 ימים
חברה חסויה
Job Type: Full Time
About us Think about literally anything in your house. Your shirt. Your phone. That random IKEA wrench thingamabob you still haven’t thrown away. Odds are, it all came from somewhere else. Freight is the invisible magic trick that makes the global economy work. And we’re the ones helping it work a little bit faster, smarter, and cheaper. Freightos (Nasdaq: CRGO) is the global booking and payment platform for the trillion-dollar freight industry. Hundreds of airlines and ocean liners, thousands of freight companies, and over ten thousand importers and exporters use our platform to move goods around the world faster and more efficiently. This matters. Efficient freight ultimately makes things cost a little bit less when you buy them in the store. We’ve been on a rocketship (freight ship?) of double-digit growth for years, and we’re nowhere near done. About the Role We are looking for a hybrid powerhouse - a DevSecOps. In this role, you will be the "Ghostbuster" of our systems, an elite specialist who ensures our platform is not only lightning-fast and reliable, but also hardened against any digital threat. You are the kind of person who locks every back door behind you while keeping the gate always open for customers worldwide. Responsibilities:
* Lead security architecture and design reviews to ensure new systems and platforms meet security, reliability, and scalability requirements.
* Develop, implement, and enforce technical security standards, secure baseline configurations, and infrastructure hardening guidelines.
* Own the reliability, availability, performance, and security of production systems across the organization.
* Design, implement, and optimize secure and scalable CI/CD pipelines, integrating security practices throughout the SDLC.
* Build and maintain automation tools and operational processes to improve deployment efficiency, system stability, and security posture.
* Enhance security and observability by implementing and managing monitoring, logging, alerting, and SIEM solutions across distributed systems.
* Lead and participate in incident response activities, including threat monitoring, on-call support, and continuous improvement of operational readiness processes.
* Conduct security assessments, vulnerability management, and compliance audits to identify and remediate risks.
* Promote a security-first engineering culture by mentoring teams on secure coding, infrastructure, and deployment best practices.
* Stay current with emerging threats, vulnerabilities, attack vectors, and industry best practices, and proactively integrate improvements into engineering and security processes.
* Participate in the on-call rotation , with availability to support a global environment.

Hybrid:
Yes
Requirements:
?Qualifications
* 4+ years of experience in DevOps and Security Engineering, with a strong focus on cloud security, infrastructure hardening, and application security.
* Hands-on experience securing cloud environments in AWS and GCP, including Infrastructure as Code (IaC) using tools such as Terraform and Ansible.
* Experienced in AI security best practice.
* Proven experience managing and supporting large-scale, high-availability, and distributed production systems.
* Strong experience integrating security controls and automated validation into CI/CD pipelines using platforms such as Jenkins and Bitbucket.
* Deep understanding of application and infrastructure security practices, including SAST, DAST, SCA, secret scanning, and vulnerability management.
* Familiarity with industry security and compliance frameworks such as CIS, NIST, ISO 27001, and SOC 2.
* Strong scripting and automation skills using Python and Bash to streamline operational and security processes.
* Experience implementing Zero Trust security principles, identity and access management (IAM), and secrets management solutions.
* Hands-on experience with AWS and GCP security
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8652396
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
10/05/2026
חברה חסויה
Location: Ramat Gan
Job Type: Full Time and Hybrid work
We are seeking a dynamic and experienced Threat Hunter to lead proactive cybersecurity efforts by uncovering hidden threats across our environment. In this role, you will drive hypothesis-based hunting, perform deep analysis and validation of security telemetry, investigate suspicious network activity, and continuously improve threat detection and response.
You will also assess CVE relevance and exploitability to prioritize real-world risk, and leverage threat intelligence feeds and enrichment pipelines to enhance hunting context, detection accuracy, and response effectiveness.
If you thrive in a fast-paced environment and are excited about pushing the boundaries of cybersecurity, we want to hear from you.
Responsibilities:
Apply data analytics to analyze security-related network data, uncover actionable threat intelligence, detect anomalies and malicious behavior, and automate findings into an enhanced detection system.
Leverage current cybersecurity knowledge to interpret and contextualize findings, enabling informed decision-making and proactive measures to strengthen overall cybersecurity defenses.
Work closely with Product and Engineering to translate threat intelligence into product strategy, prioritized features, and defensive enhancements.
Monitor and analyze the latest vulnerabilities, CVEs, exploits, and threat actor TTPs, with a focus on techniques relevant to microsegmentation, identity security, lateral movement, and internal reconnaissance.
Integrate external threat feeds and intelligence sources into our product - including normalization, enrichment, classification, and validation of feed relevance.
Contribute to detection logic, threat models, and internal tooling that turn intelligence into prevention and protection.
Provide on-the-fly support during customer incident response events and penetration testing exercises by leveraging expertise to promptly detect and block security threats.
Requirements:
2 Years of experience with threat hunting, or incident response, including analyzing data and extracting insights from it.
Knowledge of protocols, networking and computers communication - must.
Understanding of cybersecurity concepts, including common threats, vulnerabilities, attack vectors, and basic defensive measures -must.
Strong understanding of attacker behaviors and common internal network compromise TTPs.
Ability to quickly assess CVE relevance/exploitability and leverage threat intelligence feeds, enrichment pipelines, and classification systems to gauge real-world risk.
Familiarity with scripting languages (Python) and data analysis frameworks (Pandas, Jupyter).
High level of analytical and problem-solving skills with strong attention to details.
Reliability in execution of complicated and long tasks, Independent and self-learning skills.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8643586
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time and Hybrid work
Were looking for a Senior Web Security Researcher to be part of a team of highly skilled professionals that include security researchers, data researchers, data scientists and software engineers who continuously hunt for threats, evaluate and develop new detection techniques, and share intel and attribution for cybercrime activity with the goal of protecting our customers while keeping the internet human.
What you'll do:
Play a lot with the web-browsers, trying to find differences in behavior between them.
Research and develop signal collection on both mobile and desktop, which enables detection and improve our protection
Find ways to detect automation, for example, tools like Selenium, Playwright or Puppeteer.
Understand customer specific requirements, deliver with impact and exceed customer expectations.
Discover adversary tactics, techniques, and procedures leveraged by bots.
Create and validate data insights to enhance detection excellence.
Share security research topics through blogs, research talks, knowledge base and external engagements including conference presentations, detailing your discoveries for internal and external sharing.
Find bad stuff on the internet, see if you can figure out how it is done, document it.
Red team, experiment, and develop new tactics for various kinds of fraud and to bypass our detection, no need to wait for an attack to be discovered and used by adversaries first.
Stay abreast of cyber security trends and events related to our mission.
Contribute high impact work that substantially benefits team level metrics and OKRs.
Develop techniques, tools and scripts to simplify yours and others work.
Requirements:
Who you are:
B.sc in computer science or equivalent experience (technological unit alumni etc.)
Expertise in web architecture and protocols (DOM, Javascript, HTTP/HTTPS, IPv4/v6 etc.)
Understanding of the cybersecurity threat landscape.
3 years+ of proven Cyber Security Research experience.
Good English (Reading and Writing).
Proven experience in scripting languages (Python and JavaScript).
Decent experience in data analysis and relevant languages (SQL, Python).
Motivated, independent, and passionate about finding the bad guys.
Ability to motivate and lead those around you by your own contribution, professionalism, and teamwork.
Who you are - Nice to have:
Hands-on experience with data analysis of large and complex data sets (data manipulation, statistical analysis, Conclusions, etc.) - Great advantage.
Experience with threats created by bots / Creating automated web-related tools.
Reversing capabilities.
Experience with publishing technical blogs/speaking at conferences.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8608147
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
חברה חסויה
Location: Rehovot
Job Type: Full Time
The Cyber Security team is looking for a highly motivated GRC Specialist to join our team and take ownership of our Governance, Risk & Compliance program.
In this role, youll work closely with the CISO and cross-functional teams to embed security and compliance into everything we do. enabling the business to scale securely while meeting regulatory and customer expectations.
This is a high-impact position for someone who thrives in dynamic environments and wants to build, improve, and influence how security is managed across the organization.
What will you be doing:
Own and lead the organizations Governance, Risk & Compliance (GRC) program
Reporting the CISO to define and execute a GRC strategy aligned with business objectives and risk appetite
Develop, implement, and maintain security policies, standards, and procedures aligned with industry best practices and regulatory requirements
Lead and manage risk assessment processes across cybersecurity, IT, third-party, and operational domains
Maintain and actively manage the risk register, ensuring risks are identified, prioritized, tracked, and remediated
Drive and manage compliance programs (e.g., ISO 27001, NIST, CIS, GDPR), ensuring continuous audit readiness
Lead internal and external audits end-to-end, including evidence collection, auditor coordination, and remediation tracking
Manage third-party risk (TPRM), including vendor security assessments, questionnaires, and ongoing monitoring
Support product and engineering teams by integrating security and compliance requirements into new features and systems
Build and deliver risk and compliance reporting, including dashboards, KPIs, and executive-level insights
Translate technical risks into clear, business-relevant communication for leadership and stakeholders
Drive security awareness initiatives and promote a security-first culture across the organization
Requirements:
5+ years of experience in GRC, information security, risk management and compliance roles
Hands-on experience with security audits and certifications such as ISO 27001 and/or SOC 2
Strong understanding of risk management frameworks (e.g., NIST CSF, ISO 27001, CIS)
Experience managing third-party/vendor risk programs
Knowledge of data privacy and regulatory requirements (e.g., GDPR)
Familiarity with GRC platforms and compliance automation tools
Understanding of cloud environments (AWS, Azure, or GCP) and general security practices (infrastructure, application, and IT security)
Ability to manage multiple audit and compliance workstreams simultaneously with strong attention to detail
Experience with security tools and IT systems (advantage)
Familiarity with automation and/or AI-driven GRC processes (advantage)
Ability to think critically about emerging risks, including AI and evolving regulatory landscapes (advantage)
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8658286
סגור
שירות זה פתוח ללקוחות VIP בלבד